• search
    search
  • reviewers
    reviewers
  • feeds
    feeds
  • assignments
    assignments
  • settings
  • logout

A large-scale empirical analysis of the vulnerabilities introduced by third-party components in IoT firmware.

Binbin ZhaoShouling JiJiacheng XuYuan TianQiuyang WeiQinying WangChenyang LyuXuhong ZhangChangting LinJingzheng WuRaheem Beyah
Published in: ISSTA (2022)
Keyphrases